
Project Ares Enterprise + Computer Hacking Forensic Investigator Bundle
Project Ares Enterprise Bundle Virtual Courses & Labs Computer Forensics in Today’s World Computer Forensics Investigation Process Creating a Case in Autopsy Creating a Case in FTK Creating a Case in OSF Understanding Hard Disks and File Systems Hash Verification Intro To Linux - File Systems Operating System Forensics Event Logs Registry Analysis Creating a Baseline Using the Windows Forensic Toolchest (WFT) Windows Event Log Manipulation via Windows Event Viewer Linux Analysis Securing Linux - Host Based IDS Securing Linux - Log Monitoring and Auditd MAC Analysis Defeating Anti-Forensics Techniques Open Source Password Cracking Password Cracking with PRTK Data Acquisition and Duplication Metadata Extraction Lab Data Recovery with Autopsy Memory Extraction and Analysis Network Forensics Network Miner Monitoring Network Traffic Searching for Indicators of Compromise Use pfTop to Analyze Network Traffic Automated in-Depth Packet Decoding Parse Files Out of Network Traffic Securing Linux - Network Intrusion Detection Investigating Web Attacks Internet History WebApp Attack PCAP Analysis Recover from Web-Based Flashpack Incident Database Forensics Cloud Forensics Malware Forensics Analyze Malicious Activity in Memory Using Volatility Conduct Log Analysis and Cross Examination for False Positives Detect the Introduction of a Malicious Application Identify and Remove Trojan Using Various Tools Identify Suspicious Information in VM Snapshots Investigating E-mail Crimes Mobile Forensics Investigative Reports Capstone Labs: Practical - Photos R Us Image Forensics Capstone Dynamic Malware Analysis Capstone Incident Detection and Identification